Practice Free FCP_FML_AD-7.4 Exam Online Questions
Refer to the exhibit which shows an nslookup output of MX records of the example.com domain.
Which two MTA selection behaviors for the example.com domain are correct? (Choose two.)
- A . mx.example.com will receive approximately twice the number of email as mx.hosted.com because of its preference value.
- B . The primary MTA for the example.com domain is mx.hosted.com.
- C . The external MTAs will send email to mx.example.com only if mx.hosted.com is unreachable.
- D . The PriNS server should receive all email for the example.com domain.
Which encryption methods can be used to secure email communication in FortiMail? (Choose all that apply)
- A . TLS (Transport Layer Security)
- B . IBE (Identity-Based Encryption)
- C . S/MIME (Secure/Multipurpose Internet Mail Extensions)
- D . SSH (Secure Shell)
In Transparent Mode, FortiMail requires changes to the existing DNS MX records to function correctly.
- A . False
- B . True
What does an IP whitelist in FortiMail allow you to do?
- A . Block all incoming emails from specific senders.
- B . Allow emails only from a list of approved IP addresses.
- C . Automatically send suspicious emails to quarantine.
- D . Encrypt all outgoing emails.
Which part of the email header contains the recipient’s email address?
- A . To field
- B . CC field
- C . From field
- D . Subject field
What is the key difference between FortiMail’s server mode and transparent mode?
- A . Server mode only supports encrypted emails.
- B . Transparent mode does not support email filtering.
- C . Server mode requires additional hardware.
- D . Transparent mode operates without altering the existing mail server infrastructure.
In which two places can the maximum email size be overridden on FortiMail? (Choose two.)
- A . Resource Profile configuration
- B . IP Policy configuration
- C . Protected Domain configuration
- D . Session Profile configuration
Which are FortiMail operating modes? (Choose three.)
- A . Transparent mode
- B . Proxy mode
- C . NAT/Route mode
- D . Server mode
- E . Gateway mode
Which two statements about domain keys identified mail (DKIM) on FortiMail are true? (Choose two.)
- A . DNS is queried for the sending domain TXT records, which contain the DKIM public key.
- B . The private key should be shared with any remote MTAs that will participate in DKIM.
- C . The DKIM public key contains a list of authorized MTAs.
- D . A private key is used to generate a DKIM signature, which is inserted into the message headers of outbound email.
Which statement about how impersonation analysis identifies spoofed email addresses is correct?
- A . It uses behavior analysis to detect spoofed addresses.
- B . It uses DMARC validation to detect spoofed addresses.
- C . It maps the display name to the correct recipient email address.
- D . It uses SPF validation to detect spoofed addresses.